GB0208916D0 - Intrusion detection system - Google Patents

Intrusion detection system

Info

Publication number
GB0208916D0
GB0208916D0 GBGB0208916.7A GB0208916A GB0208916D0 GB 0208916 D0 GB0208916 D0 GB 0208916D0 GB 0208916 A GB0208916 A GB 0208916A GB 0208916 D0 GB0208916 D0 GB 0208916D0
Authority
GB
United Kingdom
Prior art keywords
detection system
intrusion detection
intrusion
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB0208916.7A
Other versions
GB2387681A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oxford University Innovation Ltd
Original Assignee
Oxford University Innovation Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oxford University Innovation Ltd filed Critical Oxford University Innovation Ltd
Priority to GB0208916A priority Critical patent/GB2387681A/en
Publication of GB0208916D0 publication Critical patent/GB0208916D0/en
Priority to AU2003222961A priority patent/AU2003222961A1/en
Priority to PCT/GB2003/001466 priority patent/WO2003090046A2/en
Priority to EP03718928A priority patent/EP1495390A2/en
Priority to US10/511,775 priority patent/US20050251570A1/en
Publication of GB2387681A publication Critical patent/GB2387681A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
GB0208916A 2002-04-18 2002-04-18 Intrusion detection system with inductive logic means for suggesting new general rules Withdrawn GB2387681A (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
GB0208916A GB2387681A (en) 2002-04-18 2002-04-18 Intrusion detection system with inductive logic means for suggesting new general rules
AU2003222961A AU2003222961A1 (en) 2002-04-18 2003-04-02 Intrusion detection system
PCT/GB2003/001466 WO2003090046A2 (en) 2002-04-18 2003-04-02 Intrusion detection system
EP03718928A EP1495390A2 (en) 2002-04-18 2003-04-02 Intrusion detection system
US10/511,775 US20050251570A1 (en) 2002-04-18 2003-04-02 Intrusion detection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0208916A GB2387681A (en) 2002-04-18 2002-04-18 Intrusion detection system with inductive logic means for suggesting new general rules

Publications (2)

Publication Number Publication Date
GB0208916D0 true GB0208916D0 (en) 2002-05-29
GB2387681A GB2387681A (en) 2003-10-22

Family

ID=9935092

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0208916A Withdrawn GB2387681A (en) 2002-04-18 2002-04-18 Intrusion detection system with inductive logic means for suggesting new general rules

Country Status (5)

Country Link
US (1) US20050251570A1 (en)
EP (1) EP1495390A2 (en)
AU (1) AU2003222961A1 (en)
GB (1) GB2387681A (en)
WO (1) WO2003090046A2 (en)

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7574740B1 (en) * 2000-04-28 2009-08-11 International Business Machines Corporation Method and system for intrusion detection in a computer network
US7185232B1 (en) * 2001-02-28 2007-02-27 Cenzic, Inc. Fault injection methods and apparatus
US8788650B1 (en) * 2002-07-19 2014-07-22 Fortinet, Inc. Hardware based detection devices for detecting network traffic content and methods of using the same
US8296847B2 (en) * 2003-07-25 2012-10-23 Hewlett-Packard Development Company, L.P. Method of managing utilization of network intrusion detection systems in a dynamic data center
EP1704492A1 (en) 2003-11-27 2006-09-27 Quinetiq Limited Automated anomaly detection
US20050193429A1 (en) * 2004-01-23 2005-09-01 The Barrier Group Integrated data traffic monitoring system
US20050278178A1 (en) * 2004-06-10 2005-12-15 International Business Machines Corporation System and method for intrusion decision-making in autonomic computing environments
CN100372296C (en) * 2004-07-16 2008-02-27 北京航空航天大学 Network invading detection system with two-level decision structure and its alarm optimization method
US20060075481A1 (en) * 2004-09-28 2006-04-06 Ross Alan D System, method and device for intrusion prevention
US7650640B1 (en) * 2004-10-18 2010-01-19 Symantec Corporation Method and system for detecting IA32 targeted buffer overflow attacks
CA2594020C (en) * 2004-12-22 2014-12-09 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall
US8042167B2 (en) * 2005-03-28 2011-10-18 Wake Forest University Methods, systems, and computer program products for network firewall policy optimization
US7983900B2 (en) 2006-02-08 2011-07-19 Oracle International Corporation Method, computer program and apparatus for analysing symbols in a computer system
US8443443B2 (en) 2006-10-04 2013-05-14 Behaviometrics Ab Security system and method for detecting intrusion in a computerized system
CN100440811C (en) * 2006-12-25 2008-12-03 杭州华三通信技术有限公司 Detection method and device for network attack
US8510467B2 (en) * 2007-01-11 2013-08-13 Ept Innovation Monitoring a message associated with an action
US8413247B2 (en) * 2007-03-14 2013-04-02 Microsoft Corporation Adaptive data collection for root-cause analysis and intrusion detection
US8955105B2 (en) * 2007-03-14 2015-02-10 Microsoft Corporation Endpoint enabled for enterprise security assessment sharing
US8959568B2 (en) * 2007-03-14 2015-02-17 Microsoft Corporation Enterprise security assessment sharing
US20080229419A1 (en) * 2007-03-16 2008-09-18 Microsoft Corporation Automated identification of firewall malware scanner deficiencies
US8424094B2 (en) * 2007-04-02 2013-04-16 Microsoft Corporation Automated collection of forensic evidence associated with a network security incident
EP2023572B1 (en) 2007-08-08 2017-12-06 Oracle International Corporation Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor
US9389839B2 (en) 2008-06-26 2016-07-12 Microsoft Technology Licensing, Llc Safe code for signature updates in an intrusion prevention system
US8490171B2 (en) * 2008-07-14 2013-07-16 Tufin Software Technologies Ltd. Method of configuring a security gateway and system thereof
CA2674327C (en) * 2008-08-06 2017-01-03 Trend Micro Incorporated Exploit nonspecific host intrusion prevention/detection methods and systems and smart filters therefor
US8904530B2 (en) * 2008-12-22 2014-12-02 At&T Intellectual Property I, L.P. System and method for detecting remotely controlled E-mail spam hosts
US8825473B2 (en) 2009-01-20 2014-09-02 Oracle International Corporation Method, computer program and apparatus for analyzing symbols in a computer system
US8490187B2 (en) 2009-03-20 2013-07-16 Microsoft Corporation Controlling malicious activity detection using behavioral models
US8495725B2 (en) * 2009-08-28 2013-07-23 Great Wall Systems Methods, systems, and computer readable media for adaptive packet filtering
US8666731B2 (en) 2009-09-22 2014-03-04 Oracle International Corporation Method, a computer program and apparatus for processing a computer message
US8145948B2 (en) * 2009-10-30 2012-03-27 International Business Machines Corporation Governance in work flow software
US8800036B2 (en) * 2010-01-22 2014-08-05 The School Of Electrical Engineering And Computer Science (Seecs), National University Of Sciences And Technology (Nust) Method and system for adaptive anomaly-based intrusion detection
US9058492B1 (en) * 2011-02-14 2015-06-16 Symantec Corporation Techniques for reducing executable code vulnerability
US9565213B2 (en) 2012-10-22 2017-02-07 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9137205B2 (en) 2012-10-22 2015-09-15 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9203806B2 (en) 2013-01-11 2015-12-01 Centripetal Networks, Inc. Rule swapping in a packet network
US9124552B2 (en) 2013-03-12 2015-09-01 Centripetal Networks, Inc. Filtering network data transfers
US9094445B2 (en) 2013-03-15 2015-07-28 Centripetal Networks, Inc. Protecting networks from cyber attacks and overloading
US9264370B1 (en) 2015-02-10 2016-02-16 Centripetal Networks, Inc. Correlating packets in communications networks
US9866576B2 (en) 2015-04-17 2018-01-09 Centripetal Networks, Inc. Rule-based network-threat detection
WO2017014823A2 (en) * 2015-05-04 2017-01-26 Hasan Syed Kamran Method and device for managing security in a computer network
US9838354B1 (en) * 2015-06-26 2017-12-05 Juniper Networks, Inc. Predicting firewall rule ranking value
CN105429963B (en) * 2015-11-04 2019-01-22 北京工业大学 Intrusion detection analysis method based on Modbus/Tcp
US9917856B2 (en) 2015-12-23 2018-03-13 Centripetal Networks, Inc. Rule-based network-threat detection for encrypted communications
US11729144B2 (en) 2016-01-04 2023-08-15 Centripetal Networks, Llc Efficient packet capture for cyber threat analysis
JP6750674B2 (en) * 2016-04-26 2020-09-02 日本電気株式会社 Program analysis system, program analysis method, and computer program
US10990677B2 (en) * 2017-06-05 2021-04-27 Microsoft Technology Licensing, Llc Adversarial quantum machine learning
US10503899B2 (en) 2017-07-10 2019-12-10 Centripetal Networks, Inc. Cyberanalysis workflow acceleration
US11233777B2 (en) 2017-07-24 2022-01-25 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US10284526B2 (en) 2017-07-24 2019-05-07 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US10333898B1 (en) 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
US10902207B2 (en) 2018-09-13 2021-01-26 International Business Machines Corporation Identifying application software performance problems using automated content-based semantic monitoring
US11374944B2 (en) 2018-12-19 2022-06-28 Cisco Technology, Inc. Instant network threat detection system
CN111310162B (en) * 2020-01-20 2023-12-26 深圳力维智联技术有限公司 Trusted computing-based equipment access control method, device, product and medium
US11362996B2 (en) 2020-10-27 2022-06-14 Centripetal Networks, Inc. Methods and systems for efficient adaptive logging of cyber threat incidents
US11159546B1 (en) 2021-04-20 2021-10-26 Centripetal Networks, Inc. Methods and systems for efficient threat context-aware packet filtering for network protection
FR3136294A1 (en) 2022-06-02 2023-12-08 Airbus Cybersecurity Sas Method for detecting and reporting the compromise of an electronic system of a vehicle, device and associated system
CN115174201B (en) * 2022-06-30 2023-08-01 北京安博通科技股份有限公司 Security rule management method and device based on screening tag

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69839467D1 (en) * 1997-06-26 2008-06-26 Fraunhofer Ges Forschung A method for discovering groups of objects having a selectable property from an object population
US6279113B1 (en) * 1998-03-16 2001-08-21 Internet Tools, Inc. Dynamic signature inspection-based network intrusion detection
US6370648B1 (en) * 1998-12-08 2002-04-09 Visa International Service Association Computer network intrusion detection
US6725377B1 (en) * 1999-03-12 2004-04-20 Networks Associates Technology, Inc. Method and system for updating anti-intrusion software
US6671811B1 (en) * 1999-10-25 2003-12-30 Visa Internation Service Association Features generation for use in computer network intrusion detection
US6990591B1 (en) * 1999-11-18 2006-01-24 Secureworks, Inc. Method and system for remotely configuring and monitoring a communication device
US7315801B1 (en) * 2000-01-14 2008-01-01 Secure Computing Corporation Network security modeling system and method
WO2001099372A2 (en) * 2000-06-16 2001-12-27 Securify, Inc. Efficient evaluation of rules
WO2002027443A2 (en) * 2000-09-25 2002-04-04 Itt Manufacturing Enterprises, Inc. Global computer network intrusion detection system
US6983380B2 (en) * 2001-02-06 2006-01-03 Networks Associates Technology, Inc. Automatically generating valid behavior specifications for intrusion detection
US20040123141A1 (en) * 2002-12-18 2004-06-24 Satyendra Yadav Multi-tier intrusion detection system

Also Published As

Publication number Publication date
EP1495390A2 (en) 2005-01-12
AU2003222961A1 (en) 2003-11-03
WO2003090046A3 (en) 2004-04-29
US20050251570A1 (en) 2005-11-10
GB2387681A (en) 2003-10-22
WO2003090046A2 (en) 2003-10-30

Similar Documents

Publication Publication Date Title
AU2003261306A8 (en) Intrusion detection system
GB0208916D0 (en) Intrusion detection system
IL165288A0 (en) Adaptive intrusion detection system
HK1067823A1 (en) Integrated network intrusion detection
GB0218076D0 (en) Alarm system
AU2003269893A8 (en) Secure detection network system
EP1365259A4 (en) Detecting system
EP1630572A4 (en) Distance detection system
AU2003224824A8 (en) Security system
IL162303A0 (en) Break-in detection system
GB0205188D0 (en) Detection system
AU2003229934A8 (en) Security system
GB0302378D0 (en) Detection system
HK1073005A1 (en) Fsoc/radio intrusion detection system
GB0204999D0 (en) Alarm system
GB2388232B (en) Security system
GB0306033D0 (en) Intrusion detector
GB0215585D0 (en) Anomaly detection system
GB0416028D0 (en) Detection system
GB2395551B (en) Surveillance system
GB0202504D0 (en) Intruder detection system
GB2393830B (en) Alarm system
GB0201161D0 (en) Detection system
GB2377312B (en) Alarm system
GB0221121D0 (en) Radiation detection system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)